From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Kok, Auke" Subject: Re: [PATCH] drivers/net: remove network drivers' last few uses of IRQF_SAMPLE_RANDOM Date: Thu, 15 May 2008 11:47:40 -0700 Message-ID: <482C854C.7070405@intel.com> References: <20080515142154.0595e475@core> <36D9DB17C6DE9E40B059440DB8D95F52052D71BB@orsmsx418.amr.corp.intel.com> <20080515173939.1ec968be@core> <482C7DA3.1090809@garzik.org> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: Alan Cox , "Brandeburg, Jesse" , Chris Peterson , netdev@vger.kernel.org, linux-kernel@vger.kernel.org To: Jeff Garzik Return-path: Received: from mga02.intel.com ([134.134.136.20]:11635 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1763383AbYEOSud (ORCPT ); Thu, 15 May 2008 14:50:33 -0400 In-Reply-To: <482C7DA3.1090809@garzik.org> Sender: netdev-owner@vger.kernel.org List-ID: Jeff Garzik wrote: > Alan Cox wrote: >>> In short, I agree with Alan's IRQF_SAMPLE_DUBIOUS, and know of Linux >>> customers who also want the same. >> >> They should be made to read the Debian ssh security report - three times >> and understand the same would apply to them if something did cause their >> network packet arrivals to be observed or non-random >> >> Far better would be to get your CPU guys to put an RNG back into the >> systems or on the CPU die ala VIA. Given I've even seen people using VIA >> boxes as a random number feeder (streaming random numbers over SSL) there >> is clearly a demand 8) > > The Treacherous Platform Module includes an RNG. > > Someone (hi Jesse?) should implement support for TPM_GetRandom. Sounds like something he should neither use in the e1000 driver nor implement :) This would be an interesting thing to the generic rng support in linux though Auke